Affordable Access

Publisher Website

Log management for effective incident response

Authors
Journal
Network Security
1353-4858
Publisher
Elsevier
Publication Date
Volume
2005
Issue
9
Identifiers
DOI: 10.1016/s1353-4858(05)70279-8
Keywords
  • Features
Disciplines
  • Criminology

Abstract

Log file correlation is related to two distinct activities: Intrusion Detection and Network Forensics. It is more important than ever that these two disciplines work together, and in cooperation, to avoid points of failure. This article presents an overview of log analysis and correlation, with special emphasis on the tools and techniques for managing them within a network forensics context.

There are no comments yet on this publication. Be the first to share your thoughts.

Statistics

Seen <100 times
0 Comments

More articles like this

EMS incident management: emergency medical logisti...

on Emergency medical services January 1999

How effective incident management retains market s...

on Journal of business continuity... 2012

Security incident response: rethinking risk manage...

on International Congress Series Jan 01, 2004
More articles like this..